Security Analyst (Azure Sentinel)

Pleasanton, California, United States

Applications have closed

Exciting Security Analyst (Azure Sentinel) career opportunity.

Requirements

  • Responsible for working in a 24x7 Security Operation Center (SOC) environment
  • 2 plus years of Security Operations Center Experience
  • Security monitoring experience with one or more SIEM technologies such as Azure Sentinel
  • Perform security monitoring and incident response of cyber security events for proper determination of being considered a cybersecurity event.
  • Hands on experience with Microsoft security technologies such as Microsoft Defender for Endpoint, Microsoft Cloud App Security, and Azure Sentinel
  • Optimize and tune security monitoring and detection rules and thresholds to improve fidelity of alerts
  • Produce security concern writeups and recommendations for clients on mitigating cybersecurity events.
  • Interpreting and acting on results from various security technologies including SIEM, IDS/IPS, Endpoint Solutions, DLP, etc.
  • Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, Offensive Security tools)
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications
  • Must be able to be adaptable, focused, accountable, and helpful
  • Bachelor's degree in a related field or equivalent demonstrated experience and knowledge

Tags: Azure Cloud Firewalls IDS Incident response IPS Monitoring Offensive security SIEM TCP/IP

Region: North America
Country: United States
Job stats:  21  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.